<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-uta-pqc-app-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="PQC Recommendations for Applications">Post-Quantum Cryptography Recommendations for Internet Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-uta-pqc-app-02"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="02"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <abstract>
      <?line 51?>

<t>Post-quantum cryptography brings some new challenges to applications, end users, and system administrators.
This document describes characteristics unique to application protocols and best practices for deploying
Quantum-Ready usage profiles for applications using TLS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet largely consists of services that employ a client-server architecture in which a client communicates with an application service.  When a client communicates with an application service using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or a protocol built on those (QUIC <xref target="RFC9001"/> being a notable example), the client and server can perform ephemeral public-key exchange mechanism, such as ECDH, to derive the shared secret for forward secrecy. They can validate each other's identity using X.509 certificates to establish secure communication.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. This means there is a requirement to update protocols and infrastructure to use post-quantum algorithms, which are public-key algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>The industry has successfully upgraded TLS versions while deprecating old versions (e.g., SSLv2), and many
protocols have transitioned from RSA to Elliptic Curve Cryptography (ECC) improving security while also reducing key sizes. The transition to post-quantum crypto brings different challenges, most significantly, the new Post-Quantum algorithms:</t>
      <ol spacing="normal" type="1"><li>
          <t>are still being evaluated against both classical and post-quantum attacks,</t>
        </li>
        <li>
          <t>typically use larger key sizes (which increases handshake packet size). For example, the public key sizes of ML-KEM is much larger than ECDH (see Table 5 in <xref target="I-D.ietf-pquip-pqc-engineers"/>) and the public key sizes of Dilithium/Falcon are much larger than P256 (see Table 6 in <xref target="I-D.ietf-pquip-pqc-engineers"/>), and</t>
        </li>
        <li>
          <t>While certain post-quantum (PQ) algorithms are comparatively slower than their traditional counterparts, it's important to note that specific PQ algorithms also showcase faster performance. For instance, ML-KEM utilizes less CPU than X25519, and both Dilithium and Falcon exhibit faster signature verification times than Ed25519, although with slower signature generation times.</t>
        </li>
      </ol>
      <t>All applications transmitting messages over untrusted networks can be susceptible to active or passive attacks by adversaries using CRQCs, with varying degrees of significance for both users and the underlying systems. This document explores Quantum-Ready usage profiles for applications specifically designed to defend against passive and on-path attacks employing CRQCs. TLS client and server implementations, as well as applications, can mitigate the impact of these challenges through various techniques described in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this
document, it is helpful to be able to divide cryptographic algorithms
into three classes:</t>
      <t>"Traditional Algorithm": An asymmetric cryptographic algorithm based
on integer factorisation, finite field discrete logarithms or elliptic
curve discrete logarithms. In the context of TLS, examples of
traditional key exchange algorithms include Elliptic Curve
Diffie-Hellman (ECDH); which is almost always used in the ephemeral mode referred to
as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include the Module-Lattice Key Encapsulation Mechanism (ML-KEM), which is widely known as Kyber.</t>
      <t>"Hybrid" key exchange, in this context, means the use of two component
key exchange algorithms -- one traditional algorithm and one
Post-Quantum algorithm.  The final shared secret key is secure when at
least one of the component key exchange algorithms remains
unbroken. It is referred to as PQ/T Hybrid Scheme in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>The same categories also apply to digital signature algorithms as used in X.509 certificates, Certificate Transparency SCTs, OCSP statements, Remote Attestations, and any other mechanism that contributes signatures to a TLS handshake.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for transition</name>
      <t>The timeline and driving motivation for Quantum-Ready transition differ between data confidentiality and data authentication (e.g., signature). Digital signatures are used within X.509 certificates, Certificate Revocation Lists (CRLs), and to sign messages.</t>
      <t>Encrypted payloads transmitted via Transport Layer Security (TLS) can be susceptible to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange and the transmitted ciphertext. TLS implementations commonly utilize Diffie-Hellman schemes for key exchange. If an attacker has copies of an entire set of encrypted payloads, including the TLS setup, it could employ CRQCs to potentially decrypt the payload by determining the private key.</t>
      <t>For data confidentiality, we are concerned with the so-called "Harvest Now, Decrypt Later" attack where a malicious actor with adequate resources can launch an attack to store encrypted data today that can be decrypted once a CRQC is available. This implies that, even today, encrypted data is susceptible to the attack by not implementing quantum-safe strategies, as it corresponds to data being deciphered in the future. The storage time and effective security lifetime of this encrypted data might vary from seconds to decades.</t>
      <t>For data authentication, our concern lies with an on-path attacker who possesses devices equipped with CRQCs capable of breaking traditional authentication protocols. For instance, the attacker can fake the identity of the target, leading victims to connect to the attacker's device instead of connecting to the actual target, resulting in an impersonation attack. While not an immediate threat, it is still a concern when compared to the 'Harvest Now, Decrypt Later' attack.</t>
      <t>In client/server certificate-based authentication, it's common for the certificate's signature in the TLS handshake to have a short lifetime. This means that the time between the certificate signing the CertificateVerify message and its verification by the peer during the TLS handshake is limited. However, it's worth questioning the security lifetime of the digital signatures on X.509 certificates, including those issued by root Certificate Authorities (CAs). Root CAs can have lifetimes of 20 years or more. Additionally, root Certificate Revocation Lists (CRLs) may have lifetimes of a year or more, while delegated credentials like CRL Signing Certificates or OCSP response signing certificates can have lifetimes that fall anywhere in between.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>Data in transit may need to be protected for lifetimes measured in years.
The possibility of CRQCs being developed means that we need to move away from traditional algorithms,
but at the same time uncertainty about post-quantum algorithm implementation security, lag in standardization, regulatory requirements, and maturity of cryptanalysis may require the continued use of mature traditional algorithms alongside the new post-quantum primitives.</t>
      <t>The primary goal of a hybrid key exchange mechanism is to facilitate
the establishment of a shared secret which remains secure as long as one of the component key exchange mechanisms remains unbroken.</t>
      <t><xref target="I-D.ietf-tls-hybrid-design"/> provides a construction for hybrid key exchange in TLS 1.3. It fulfils the primary goal of hybrid key exchange, with additional objectives discussed in Section 1.5 of the same document.</t>
      <t>Applications that use (D)TLS and susceptible to CRQC attack <bcp14>MUST</bcp14> migrate to (D)TLS 1.3 and support the hybrid key exchange, as defined in <xref target="I-D.ietf-tls-hybrid-design"/>. In the future, we anticipate a shift away from traditional cryptographic algorithms in favor of post-quantum algorithms. This transition is expected to provide benefits in terms of CPU efficiency and reduced data transmission overhead compared to hybrid key exchange.</t>
      <t>The client initiates the TLS handshake by sending a list of key agreement methods it supports in the key_share extension. One of the challenges during the PQC migration is that the client may not know whether the server supports the Hybrid key exchange. To address this uncertainty, the client can adopt one of two strategies:</t>
      <ol spacing="normal" type="1"><li>
          <t>Sending Both Traditional and Hybrid Key Exchange Algorithms: In the initial ClientHello message, the client has the option to send both traditional and hybrid key exchange algorithm key shares to the server, eliminating the need for multiple round trips. It's important to note that the size of the hybrid key exchange algorithm key share may exceed the MTU, leading to the possibility of splitting the ClientHello message across multiple packets. However, this approach necessitates additional computations on the client side and results in increased handshake traffic. During the TLS handshake, the server responds to the ClientHello by providing its public key and ciphertext. If the combined size of these components exceeds the MTU, there's a chance that the ServerHello message may be fragmented across multiple TCP packets. This fragmentation raises the risk of lost packets and potential delays due to retransmission.</t>
        </li>
        <li>
          <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message.</t>
        </li>
      </ol>
      <t>Clients <bcp14>MAY</bcp14> use information from completed handshakes to cache the server's preferences for key exchange algorithms (<xref target="RFC8446"/>, section 4.2.7).</t>
      <t>In order to avoid multiple packets to send ClientHello message, the client would have to prevent the duplication of PQC KEM public key shares in the ClientHello, avoiding duplication of key shares is discussed in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t><xref target="I-D.davidben-tls-key-share-prediction"/> defines a mechanism for servers to communicate key share preferences in DNS responses. TLS clients can use this information to reduce TLS handshake round-trips.</t>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>While CRQCs could decrypt previous TLS sessions, client/server authentication based on certificates cannot be retroactively broken. However, given the multi-year lead-time required to establish, certify, and embed new root CAs, it would be difficult to react in a timely manner if CRQCs come online sooner than anticipated. So while PQ migration of X.509 certificates has more time than key exchanges, we should not delay this work for too long.</t>
      <t>The Quantum-Ready authentication property can be utilized in scenarios where an on-path attacker possesses network devices equipped with CRQCs, capable of breaking traditional authentication protocols. If an attacker uses CRQC to determine the private key of a server certificate before the certificate expiry, the attacker can create a fake server, and then every user will think that their connection is legitimate. The server impersonation leads to various security threats, including impersonation, data disclosure, and the interception of user data and communications.</t>
      <t>The Quantum-Ready authentication property ensures authentication through either a pure Post-Quantum or a PQ/T hybrid Certificate.</t>
      <ul spacing="normal">
        <li>
          <t>A Post-Quantum X.509 Certificate using Module-Lattice Digital Signature Algorithm (ML-DSA), also called <br/>
Dilithium, is defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>.</t>
        </li>
        <li>
          <t>The PQ/T Hybrid Authentication property is currently still under active exploration and discussion in the <br/>
LAMPS WG, and consensus may evolve over time regarding its adoption.</t>
        </li>
        <li>
          <t>The non-composite hybrid authentication discussed in <xref target="I-D.ietf-lamps-cert-binding-for-multi-auth"/> 
enables peers to employ the same certificates in hybrid authentication as in authentication done with only traditional or post-quantum algorithms. In TLS, peers can request that both traditional and PQ certificate be used for authentication. For instance, traditional certificates can be exchanged during the TLS handshake and PQ certificates can be exchanged after the session has been established using the mechanism defined in <xref target="RFC9261"/>.</t>
        </li>
        <li>
          <t>The composite signature contains two signatures in a single atomic container that have been generated  <br/>
using two different cryptographic algorithms. For example, NIST define a dual signature as "two or more signatures on a common message". The goal of this approach is to define a signature format which requires both contained signatures to be verified. This concept is described in Composite Signatures For Use In Internet PKI <xref target="I-D.ounsworth-pq-composite-sigs"/>.</t>
        </li>
      </ul>
      <t>To decide whether and when to support a Post-Quantum Certificate (PQC) or a PQ/T hybrid scheme for client and server authentication, it is important to consider factors such as the frequency and duration of system upgrades, as well as the anticipated availability of CRQCs. For example, applications that have extremely short key lifetimes -- for example less than an hour -- may decide that it is an acceptable risk to leave those on Traditional algorithms for the foreseeable future under the assumption that quantum key factoring attacks take longer to run than the key lifetimes. It may be advantageous to explore heterogeneous PKI architectures where the long-lived CAs are using Post-Quantum algorithms but the server and client certificates are not. In summary, if the signature is not post-quantum secure, further evaluation is needed to determine whether the attempt to achieve post-quantum security using short-lived keys is effective or not.</t>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client doesn't support PQC or hybrid key exchange, it can send an 'insufficient_security' fatal alert to the client. The client can inform the end-users that the server they are trying to access requires a level of security that the client cannot provide due to the lack of PQC support. Furthermore, the client may log the event for diagnostic and security auditing purposes and report the security-related issue to the client development team.</t>
      <t>Similarly, when the client detects that the server doesn't support PQC or hybrid key exchange, it can send an alert or error page to the client. The message can inform the end-user that the server is not compatible with the PQC security features offered by the client.</t>
    </section>
    <section anchor="application-protocols">
      <name>Application Protocols</name>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks for end users exchanging DNS messages in clear text are discussed in <xref target="RFC7518"/>. Transport Layer Security (TLS) is employed to ensure privacy for DNS. DNS encryption provided by TLS (e.g., DNS-over-HTTPS, DNS-over-TLS, DNS-over-QUIC) eliminates opportunities for eavesdropping and on-path tampering while in transit through the network.</t>
        <t>Encrypted DNS messages transmitted using Transport Layer Security (TLS) may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the TLS key exchange. If an attacker possesses copies of an entire set of encrypted DNS messages, including the TLS setup, it could use a CRQC to potentially decrypt the message content by determining the ephemeral key exchange private key.</t>
        <t>Encrypted DNS protocols will have to support the Quantum-Ready usage profile discussed in {#confident}.</t>
        <t>Note that post-quantum security of DNSSEC <xref target="RFC9364"/>, which provides authenticity for DNS records, is a separate issue from the requirements for encrypted DNS transports.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke">
        <name>Hybrid public-key encryption (HPKE)</name>
        <t>Hybrid public-key encryption (HPKE) is a scheme that provides public key encryption of arbitrary-sized plaintexts given a recipient's public key. HPKE utilizes a non-interactive ephemeral-static Diffie-Hellman exchange to establish a shared secret.  The motivation for standardizing a public key encryption scheme is explained in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support PQ/T Hybrid post-quantum Key Encapsulation Mechanisms (KEMs) as defined in <xref target="I-D.westerbaan-cfrg-hpke-xyber768d00-02"/>. Kyber, which is a KEM does not support the static-ephemeral key exchange that allows HPKE based on DH based KEMs. Note that X25519Kyber768Draft00 is IND-CCA2 secure (Section 4 of <xref target="I-D.westerbaan-cfrg-hpke-xyber768d00-02"/>).</t>
        <section anchor="ech">
          <name>Interaction with Encrypted Client Hello</name>
          <t>Client TLS libraries and applications can use Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity in the TLS handshake which requires also deploying Encrypted DNS (DNS over TLS), otherwise a passive listener can observe DNS queries (or responses) and infer same server identity that was being protected with ECH. ECH uses HPKE for public key encryption.</t>
          <t>ECH <bcp14>MUST</bcp14> incorporate support for PQ/T Hybrid post-quantum KEMs to protect against the 'Harvest Now, Decrypt Later' attack.</t>
          <t>To use ECH the client needs to learn the ECH configuration for a server before it attempts a connection to the server. Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings specification <xref target="I-D.draft-ietf-tls-svcb-ech"/> provides a mechanism for conveying the ECH configuration information via DNS, using a SVCB or HTTPS record. The "ech" SvcParamKey is used in SVCB or HTTPS or DNS records, and is intended to serve as the primary bootstrap mechanism for ECH. The value of the parameter is an ECHConfigList (Section 4 of <xref target="I-D.ietf-tls-esni"/>). The public_key in HpkeKeyConfig structure would carry the concatenation of traditional and PQC KEM public keys which would increase DNS resposnse size that could exceed the path MTU. It would require the use of reliable transport and Encrypted DNS (e.g., DoT, DoH or DoQ).</t>
        </section>
        <section anchor="oblivious-http">
          <name>Oblivious HTTP</name>
          <t>Oblivious HTTP <xref target="I-D.ietf-ohai-ohttp"/> allows clients to encrypt messages exchanged with an Oblivious Target Resource (target). The messages are encapsulated in encrypted messages to an Oblivious Gateway Resource (gateway), which offers Oblivious HTTP access to the target. The gateway is accessed via an Oblivious Relay Resource (relay), which proxies the encapsulated messages to hide the identity of the client. Overall, this architecture is designed in such a way that the relay cannot inspect the contents of messages, and the gateway and target cannot learn the client's identity from a single transaction. Oblivious HTTP uses HPKE for encapsulating binary HTTP messages to protect their contents.</t>
          <t>Oblivious HTTP is vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the HPKE. If an attacker possesses copies of an entire set of encapsulated HTTP messages, it could use CRQC to potentially decrypt the message content by determining the private key. The attacker can potentially be the Oblivious Relay Resource.</t>
          <t>The "ohttp" SvcParamKey defined in <xref target="I-D.ietf-ohai-svcb-config"/> is used to indicate that a service described in an SVCB RR can be accessed as a target using an associated gateway. For the "dns" scheme, as defined in <xref target="I-D.draft-ietf-add-svcb-dns"/>, the presence of the "ohttp" parameter means that the DNS server being described has a DNS over HTTP (DoH) <xref target="RFC8484"/> service that can be accessed using Oblivious HTTP.</t>
          <t>Oblivious HTTP and DNS over Oblivious HTTP <bcp14>MUST</bcp14> incorporate support for PQ/T Hybrid post-quantum KEMs to protect against the 'Harvest Now, Decrypt Later' attack.</t>
        </section>
        <section anchor="mls">
          <name>MLS</name>
          <t>The Messaging Layer Security (MLS) Protocol <xref target="RFC9420"/> enables asynchronous group keying with forward secrecy and post-compromise security. MLS uses HPKE for public key encryption. HPKE can be extended to support PQ/T Hybrid post-quantum Key Encapsulation Mechanisms (KEMs) as defined in <xref target="I-D.westerbaan-cfrg-hpke-xyber768d00-02"/>.</t>
        </section>
      </section>
      <section anchor="webrtc">
        <name>WebRTC</name>
        <t>In WebRTC, secure channels are set up via DTLS and DTLS-SRTP <xref target="RFC5763"/> keying for SRTP <xref target="RFC3711"/> for media channels and the Stream Control Transmission Protocol (SCTP) over DTLS <xref target="RFC8261"/> for data channels.</t>
        <t>Secure channels may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the DTLS key exchange. If an attacker possesses copies of an entire set of encrypted media, including the DTLS setup, it could use CRQC to potentially decrypt the media by determining the private key.</t>
        <t>WebRTC media and data channels <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}.</t>
        <t>The other challenge with WebRTC is that PQC KEMs often come with large public keys and PQC Signature schemes come with large signatures in comparison with traditional algorithms (as discussed in Section 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). In many cases, UDP datagrams are restricted to sizes smaller than 1500 bytes. If IP fragmentation needs to be avoided, each DTLS handshake message must be fragmented over several DTLS records, with each record intended to fit within a single UDP datagram. This approach could potentially lead to increased time to complete the DTLS handshake and involve multiple round-trips in lossy networks. It may also extend the time required to set up secure WebRTC channels. One potential mitigation strategy to avoid the delay is to prevent the duplication PQC KEM public key shares in the ClientHello, avoiding duplication of key shares is discussed in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      </section>
      <section anchor="https">
        <name>HTTPS</name>
        <t>HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP used for secure data exchange over the web. HTTPS primarily relies on the TLS (Transport Layer Security) protocol to provide encryption, integrity, and authenticity for data in transit.</t>
        <t>HTTP messages transmitted using Transport Layer Security (TLS) may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the TLS key exchange. If an attacker possesses copies of an entire set of encrypted HTTP messages, including the TLS setup, it could use CRQC to potentially decrypt the message content by determining the private key. This traffic can include sensitive information, such as login credentials, personal data, or financial details, depending on the nature of the communication.</t>
        <t>If an attacker can decrypt the message content before the expiry of the login credentials, the attacker can steal the credentials. The theft of login credentials is a serious security concern that can have a wide range of consequences for individuals and organizations. The most immediate and obvious challenge is that the attacker gains unauthorized access to the victim's accounts, systems, or data. This can lead to data breaches, privacy violations, and various forms of cybercrime.</t>
        <t>Applications using HTTPS to exchange sensitive data <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}. If the data is genuinely non-sensitive and has no privacy or security implications, the motivation for an attacker to invest resources in capturing and later decrypting it would likely be very low. In such cases, the "Harvest Now, Decrypt Later" attack may not be relevant. In similar lines, reverse proxies operated between clients and origin servers will also have to support {#confident}.</t>
      </section>
      <section anchor="email-submission">
        <name>Email Submission</name>
        <t>Email often contains information that needs protection from passive monitoring or active modification. While some standards exist for protecting integrity and for encrypting content of messages themselves (see <xref target="RFC8551"/>), transport encryption is also frequently used. TLS support for Email Submission/Access is described in <xref section="3.3" sectionFormat="of" target="RFC8314"/>. The Mail User Agent (MUA) and a Mail Submission Server or Mail Access Server <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Post-quantum algorithms selected for standardization are relatively
new and they they have not been subject to the same depth of study as
traditional algorithms. PQC implementations will also be new and
therefore more likely to contain implementation bugs than the
battle-tested crypto implementations that we rely on today. In
addition, certain deployments may need to retain traditional
algorithms due to regulatory constraints, for example FIPS
<xref target="SP-800-56C"/> or PCI compliance. Hybrid key exchange enables
potential security against "Harvest Now, Decrypt Later" attack provide
for time to react in the case of the announcement of a devastating
attack against any one algorithm, while not fully abandoning
traditional cryptosystems.</t>
      <t>Implementing PQ/T hybrid schemes improperly can introduce security issues at the cryptographic layer, for example how the Traditional and PQ schemes are combined; at the algorithm selection layer, mismatched security levels for example if 192-bit KEM is used with a 128-bit secure combiner; or at the protocol layer in how the upgrade/downgrade mechanism works. PQ/T hybrid schemes should be implemented carefully and all relevant specifications implemented correctly.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting wider document scope. Thanks to Mike Ounsworth, Scott Fluhrer, 
Bas Westerbaan and Thom Wiggers for review and feedback.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="7" month="September" year="2023"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
        </reference>
        <reference anchor="I-D.davidben-tls-key-share-prediction">
          <front>
            <title>TLS Key Share Prediction</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <date day="25" month="September" year="2023"/>
            <abstract>
              <t>   This document clarifies an ambiguity in the TLS 1.3 key share
   selection, to avoid a downgrade when server assumptions do not match
   client behavior.  It additionally defines a mechanism for servers to
   communicate key share preferences in DNS.  Clients may use this
   information to reduce TLS handshake round-trips.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-davidben-tls-key-share-prediction-00"/>
        </reference>
        <reference anchor="RFC9261">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="I-D.draft-ietf-add-svcb-dns">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="26" month="June" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service.  DNS itself can be such a service, when the server is identified by a domain name.  This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-09"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC5763">
          <front>
            <title>Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS)</title>
            <author fullname="J. Fischl" initials="J." surname="Fischl"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies how to use the Session Initiation Protocol (SIP) to establish a Secure Real-time Transport Protocol (SRTP) security context using the Datagram Transport Layer Security (DTLS) protocol. It describes a mechanism of transporting a fingerprint attribute in the Session Description Protocol (SDP) that identifies the key that will be presented during the DTLS handshake. The key exchange travels along the media path as opposed to the signaling path. The SIP Identity mechanism can be used to protect the integrity of the fingerprint attribute from modification by intermediate proxies. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5763"/>
          <seriesInfo name="DOI" value="10.17487/RFC5763"/>
        </reference>
        <reference anchor="RFC3711">
          <front>
            <title>The Secure Real-time Transport Protocol (SRTP)</title>
            <author fullname="M. Baugher" initials="M." surname="Baugher"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Naslund" initials="M." surname="Naslund"/>
            <author fullname="E. Carrara" initials="E." surname="Carrara"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3711"/>
          <seriesInfo name="DOI" value="10.17487/RFC3711"/>
        </reference>
        <reference anchor="RFC8261">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Encapsulation of SCTP Packets</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="R. Jesup" initials="R." surname="Jesup"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <date month="November" year="2017"/>
            <abstract>
              <t>The Stream Control Transmission Protocol (SCTP) is a transport protocol originally defined to run on top of the network protocols IPv4 or IPv6. This document specifies how SCTP can be used on top of the Datagram Transport Layer Security (DTLS) protocol. Using the encapsulation method described in this document, SCTP is unaware of the protocols being used below DTLS; hence, explicit IP addresses cannot be used in the SCTP control chunks. As a consequence, the SCTP associations carried over DTLS can only be single-homed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8261"/>
          <seriesInfo name="DOI" value="10.17487/RFC8261"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <date day="22" month="February" year="2024"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-03"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="2" month="February" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-02"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="5" month="February" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using the Module-Lattice-Based Digital
   Signatures (ML-DSA) in Internet X.509 certificates and certificate
   revocation lists.  The conventions for the associated signatures,
   subject public keys, and private key are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-03"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-cert-binding-for-multi-auth">
          <front>
            <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
            <author fullname="Alison Becker" initials="A." surname="Becker">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
              <organization>National Security Agency</organization>
            </author>
            <date day="29" month="November" year="2023"/>
            <abstract>
              <t>   This document defines a new CSR attribute, relatedCertRequest, and a
   new X.509 certificate extension, RelatedCertificate.  The use of the
   relatedCertRequest attribute in a CSR and the inclusion of the
   RelatedCertificate extension in the resulting certificate together
   provide additional assurance that two certificates each belong to the
   same end entity.  This mechanism is particularly useful in the
   context of non-composite hybrid authentication, which enables users
   to employ the same certificates in hybrid authentication as in
   authentication done with only traditional or post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cert-binding-for-multi-auth-03"/>
        </reference>
        <reference anchor="I-D.ounsworth-pq-composite-sigs">
          <front>
            <title>Composite Signatures For Use In Internet PKI</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>D-Trust GmbH</organization>
            </author>
            <date day="11" month="February" year="2024"/>
            <abstract>
              <t>   The migration to post-quantum cryptography is unique in the history
   of modern digital cryptography in that neither the old outgoing nor
   the new incoming algorithms are fully trusted to protect data for the
   required data lifetimes.  The outgoing algorithms, such as RSA and
   elliptic curve, may fall to quantum cryptanalysis, while the incoming
   post-quantum algorithms face uncertainty about both the underlying
   mathematics as well as hardware and software implementations that
   have not had sufficient maturing time to rule out classical
   cryptanalytic attacks and implementation bugs.

   Cautious implementers may wish to layer cryptographic algorithms such
   that an attacker would need to break all of them in order to
   compromise the data being protected using either a Post-Quantum /
   Traditional Hybrid, Post-Quantum / Post-Quantum Hybrid, or
   combinations thereof.  This document, and its companions, defines a
   specific instantiation of hybrid paradigm called "composite" where
   multiple cryptographic algorithms are combined to form a single key
   or signature such that they can be treated as a single atomic object
   at the protocol level.

   This document defines the structures CompositeSignaturePublicKey,
   CompositeSignaturePrivateKey and CompositeSignatureValue, which are
   sequences of the respective structure for each component algorithm.
   Composite signature algorithm identifiers are specified in this
   document which represent the explicit combinations of the underlying
   component algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-12"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.westerbaan-cfrg-hpke-xyber768d00-02">
          <front>
            <title>X25519Kyber768Draft00 hybrid post-quantum KEM for HPKE</title>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="May" year="2023"/>
            <abstract>
              <t>   This memo defines X25519Kyber768Draft00, a hybrid post-quantum KEM,
   for HPKE (RFC9180).  This KEM does not support the authenticated
   modes of HPKE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-westerbaan-cfrg-hpke-xyber768d00-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="9" month="October" year="2023"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-17"/>
        </reference>
        <reference anchor="I-D.draft-ietf-tls-svcb-ech">
          <front>
            <title>Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="26" month="September" year="2023"/>
            <abstract>
              <t>   To use TLS Encrypted ClientHello (ECH) the client needs to learn the
   ECH configuration for a server before it attempts a connection to the
   server.  This specification provides a mechanism for conveying the
   ECH configuration information via DNS, using a SVCB or HTTPS record.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-svcb-ech-00"/>
        </reference>
        <reference anchor="I-D.ietf-ohai-ohttp">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="August" year="2023"/>
            <abstract>
              <t>   This document describes Oblivious HTTP, a protocol for forwarding
   encrypted HTTP messages.  Oblivious HTTP allows a client to make
   multiple requests to an origin server without that server being able
   to link those requests to the client or to identify the requests as
   having come from the same client, while placing only limited trust in
   the nodes used to forward the messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-10"/>
        </reference>
        <reference anchor="I-D.ietf-ohai-svcb-config">
          <front>
            <title>Discovery of Oblivious Services via Service Binding Records</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="6" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a parameter that can be included in SVCB and
   HTTPS DNS resource records to denote that a service is accessible
   using Oblivious HTTP, by offering an Oblivious Gateway Resource
   through which to access the target.  This document also defines a
   mechanism to learn the key configuration of the discovered Oblivious
   Gateway Resource.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-svcb-config-07"/>
        </reference>
        <reference anchor="RFC9420">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="RFC8551">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8551"/>
          <seriesInfo name="DOI" value="10.17487/RFC8551"/>
        </reference>
        <reference anchor="RFC8314">
          <front>
            <title>Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access</title>
            <author fullname="K. Moore" initials="K." surname="Moore"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This specification outlines current recommendations for the use of Transport Layer Security (TLS) to provide confidentiality of email traffic between a Mail User Agent (MUA) and a Mail Submission Server or Mail Access Server. This document updates RFCs 1939, 2595, 3501, 5068, 6186, and 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8314"/>
          <seriesInfo name="DOI" value="10.17487/RFC8314"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
